Access Control System suppliers in Dubai (1) - PowerPoint PPT Presentation

About This Presentation
Title:

Access Control System suppliers in Dubai (1)

Description:

Access Control System suppliers in Dubai.Logical access control limits connections to computer networks, system files and data. for information call us:+971 544 468 621 – PowerPoint PPT presentation

Number of Views:58

less

Transcript and Presenter's Notes

Title: Access Control System suppliers in Dubai (1)


1
Access control system suppliers in Dubai
Id Trends Beyond Identity
https//idtrends.com/
2

Introduction
  • Access control is a security technique that
    regulates who or what can view or use resources
    in a computing environment.
  • There are two types of access control physical
    and logical. Physical access control limits
    access to campuses, buildings, rooms and physical
    IT assets.

3
(No Transcript)
4
Types of Access ControlTypes of Access
Control
  • Mandatory access control (MAC)
  • A security model in which access rights are
    regulated by
  • a central authority based on multiple levels of
    security.
  • Often used in government and military
    environments,
  • classifications are assigned to system resources
    and the
  • operating system

5
Discretionary access control (DAC)
  • An access control method in which owners or
    administrators of the protected system, data or
    resource set the policies defining who or what is
    authorized to access the resource.
  • Many of these systems enable administrators to
    limit the propagation of access rights.
  • A common criticism of DAC systems is a lack of
    centralized control.

6
Rule-based access control
  • A security model in which the system
    administrator defines the rules that to govern
    access to resource objects.
  • Often these rules are based on conditions, such
    as time of day or location.
  • It is not uncommon to use some form of both
    rule-based access control and role-based access
    control to enforce access policies and
    procedures.

7
Attribute-based access control (ABAC)
  • A methodology that manages access rights by
    evaluating a set of rules, policies and
    relationships using the attributes of users,
    systems and environmental conditions.

8
  • THANK YOU

Call Us 971544468621
Write a Comment
User Comments (0)
About PowerShow.com